What is Teleport?
Teleport makes it easy for users to securely access infrastructure and meet the toughest compliance requirements.
Teleport is a tool in the Cloud Access Management category of a tech stack.
Who uses Teleport?
5 developers on StackShare have stated that they use Teleport.
Pros of Teleport
Be the first to leave a pro
- Isolate critical infrastructure and enforce 2FA when using SSH and Kubernetes
- Provide role-based access controls (RBAC) using short-lived certificates and your existing identity management service
- Log and record session activity for full auditability
- Forget about managing keys, VPNs, firewalls, jump boxes, or IPs
- Compatible with OpenSSH and Kubernetes
- Supports SAML, OIDC
Teleport Alternatives & Comparisons
What are some alternatives to Teleport?
See all alternatives
warp lets you securely share your terminal with one simple command: warp open. When connected to your warp, clients can see your terminal exactly as if they were sitting next to you. You can also grant them write access, the equivalent of handing them your keyboard.
AWS Identity and Access Management.
AWS Service Catalog
AWS Service Catalog allows IT administrators to create, manage, and distribute catalogs of approved products to end users, who can then access the products they need in a personalized portal. Administrators can control which users have access to each application or AWS resource to enforce compliance with organizational business policies. AWS Service Catalog allows your organization to benefit from increased agility and reduced costs because end users can find and launch only the products they need from a catalog that you control.
It supports a family of privileged identity management, privileged remote access, and vulnerability management products for UNIX, Linux, Windows and Mac OS operating systems.
It provides enterprise identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.